Digital Image Forgeries and Passive Image Authentication Techniques: A Survey

Digital images are present everywhere on magazine covers, in newspapers, in courtrooms as evidences, and all over the Internet signifying one of the major ways for communication nowadays. The trustworthiness of digital images has been questioned, because of the ease with which these images can be manipulated in both its origin & content as a result of tremendous growth of digital image manipulation tools. Digital image forensics is the latest research field which intends to authorize the genuineness of images. This survey attempts to provide an overview of various digital image forgeries and the state of art passive methods to authenticate digital images.

[1]  Zhang Xiong,et al.  3D lighting-based image forgery detection using shape-from-shading , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[2]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[3]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[4]  Xiaochun Cao,et al.  Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Mohd Aizaini Maarof,et al.  Sequential Straightforward Clustering for Local Image Block Matching , 2011 .

[6]  H. Farid A Survey of Image Forgery Detection , 2008 .

[7]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[8]  Edoardo Ardizzone,et al.  Copy-move forgery detection via texture description , 2010, MiFor '10.

[9]  Jiwu Huang,et al.  A survey of passive technology for digital image forensics , 2007, Frontiers of Computer Science in China.

[10]  Jiwu Huang,et al.  Detect Digital Image Splicing with Visual Cues , 2009, Information Hiding.

[11]  Xuemin Wu,et al.  Image Splicing Detection Using Illuminant Color Inconsistency , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[12]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[13]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[14]  Yogesh Rathore,et al.  DWT Based Copy-Move Image Forgery Detection , 2012 .

[15]  Xinpeng Zhang,et al.  Image Splicing Detection Using Camera Characteristic Inconsistency , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[16]  Wei Lu,et al.  Digital image forensics using statistical features and neural network classifier , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[17]  Thomas S. Huang,et al.  Image processing , 1971 .

[18]  Michele De Santis,et al.  Holographic watermarking for authentication of cut images , 2011 .

[19]  Héctor M. Pérez Meana,et al.  Watermarking-based image authentication with recovery capability using halftoning technique , 2013, Signal Process. Image Commun..

[20]  Siyuan Fang,et al.  Multi-perspective Panoramas of Long Scenes , 2012, 2012 IEEE International Conference on Multimedia and Expo.

[21]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[22]  David Renshaw,et al.  IEEE International Symposium on Circuits and Systems (ISCAS) , 1990 .

[23]  Mohd Aizaini Maarof,et al.  Efficient image duplicated region detection model using sequential block clustering , 2013, Digit. Investig..

[24]  Jing Dong,et al.  Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[25]  Shih-Fu Chang,et al.  Passive-blind Image Forensics , 2006 .

[26]  Jianhua Li,et al.  Detecting Digital Image Splicing in Chroma Spaces , 2010, IWDW.

[27]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[28]  Wenjun Zeng,et al.  Multimedia Security Technologies for Digital Rights Management , 2006 .

[29]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[30]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[31]  Asoke K. Nandi,et al.  Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..

[32]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[33]  Guna Seetharaman,et al.  Harnessing Motion Blur to Unveil Splicing , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Luisa Verdoliva,et al.  A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Mahalingam Ramkumar,et al.  A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[36]  Mengjia Xu,et al.  Image region duplication detection based on circular window expansion and phase correlation. , 2012, Forensic science international.

[37]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[38]  Hongtao Lu,et al.  Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..

[39]  Xiaochun Cao,et al.  Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.

[40]  Zhen Zhang,et al.  An Effective Algorithm of Image Splicing Detection , 2008, 2008 International Conference on Computer Science and Software Engineering.

[41]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[42]  B. L. Shivakumar,et al.  Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods , 2010 .

[43]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[44]  Der-Chyuan Lou,et al.  A semi-blind digital watermarking scheme based on singular value decomposition , 2006, Comput. Stand. Interfaces.

[45]  Tao Jing,et al.  Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[46]  Yingda Lv,et al.  An improved image blind identification based on inconsistency in light source direction , 2011, The Journal of Supercomputing.

[47]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[48]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[49]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[50]  Jan P. Allebach,et al.  Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[51]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[52]  K. J. Ray Liu,et al.  Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.

[53]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[54]  Hong-Yuan Mark Liao,et al.  An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..

[55]  Cheng Yang,et al.  Image authentication based on digital signature and semi-fragile watermarking , 2008, Journal of Computer Science and Technology.

[56]  Jianru Xue,et al.  Image forensic signature for content authenticity analysis , 2012, J. Vis. Commun. Image Represent..

[57]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[58]  E. S. Gopi Subbu,et al.  Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[59]  Zhi-ping Zhou,et al.  Image splicing detection based on image quality and analysis of variance , 2010, 2010 2nd International Conference on Education Technology and Computer.

[60]  Farrokh Janabi-Sharifi,et al.  Data-driven modeling of thermal energy storage tank , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[61]  Ibon Saratxaga,et al.  Detection of synthetic speech for the problem of imposture , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[62]  Yingda Lv,et al.  Blind Identification Method for Authenticity of Infinite Light Source Images , 2010, 2010 Fifth International Conference on Frontier of Computer Science and Technology.

[63]  Madhumita Sengupta,et al.  Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)☆ , 2013 .

[64]  Kouichi Sakurai,et al.  Exploiting reference images for image splicing verification , 2013, Digit. Investig..

[65]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[66]  Zhen Zhang,et al.  A survey on passive-blind image forgery by doctor method detection , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[67]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[68]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[69]  Tian-Tsong Ng,et al.  Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[70]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[71]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[72]  Wei Su,et al.  Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[73]  Xinpeng Zhang,et al.  Image Splicing Detection Using Color Edge Inconsistency , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[74]  Yao Zhao,et al.  Forensic estimation of gamma correction in digital images , 2010, 2010 IEEE International Conference on Image Processing.

[75]  Pan Feng,et al.  A survey of passive technology for digital image forensics , 2007 .

[76]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[77]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[78]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[79]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[80]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[81]  Chen Haipeng Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .

[82]  Shih-Fu Chang Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.

[83]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[84]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[85]  G. Bebis,et al.  Blind copy move image forgery detection using dyadic undecimated wavelet transform , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[86]  K. J. Ray Liu,et al.  Forensic estimation and reconstruction of a contrast enhancement mapping , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[87]  B. Mahdian,et al.  Blind methods for detecting image fakery , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.

[88]  David R. Bull,et al.  Projective image restoration using sparsity regularization , 2013, 2013 IEEE International Conference on Image Processing.

[89]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[90]  Hwei-Jen Lin,et al.  An Efficient Method for Copy-Move Forgery Detection , 2009 .

[91]  Ran-Zan Wang,et al.  Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[92]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[93]  Xuan-jing Shen,et al.  Blind identification algorithm for retouched images based on Bi-Laplacian: Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .

[94]  Qingzhong Liu,et al.  A new approach for JPEG resize and image splicing detection , 2009, MiFor '09.

[95]  Tian-Tsong Ng,et al.  Camera response function signature for digital forensics - Part II: Signature extraction , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[96]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.